首页 > 最新文献

2018 9th International Conference on the Network of the Future (NOF)最新文献

英文 中文
MDTCP: Towards a Practical Multipath Transport Protocol for Telco Cloud Datacenters MDTCP:面向电信云数据中心的实用多路径传输协议
Pub Date : 2018-11-01 DOI: 10.1109/NOF.2018.8598129
Dejene Boru Oljira, Karl-Johan Grinnemo, A. Brunström, J. Taheri
The next-generation networks (5G) aims to support services that demand strict requirements such as low-latency, high throughput, and high availability. Telecom operators have adopted Network Functions Virtualization (NFV) to virtualize the network functions and deploy at distributed cloud datacenters. Deploying virtual network functions (VNFs) close to the end-user can reduce Internet latency. However, network congestion in telco cloud datacenters can result in increased latency, low network utilization and a drop of throughput. The existing protocols are not capable of utilizing the multiple paths offered by datacenter topologies e.g., DCTCP; require a major architectural change and face deployment challenges e.g., NDP; or increase flow completion times of short flows e.g., MPTCP. To address this, we propose a multipath transport for telco cloud datacenters called coupled multipath datacenter TCP, MDTCP. MDTCP evolves MPTCP subflows to employ ECN signals to react to congestion before queue overflow, offering both reduced latency and higher network utilization. The evaluation of MDTCP with simulated traffic indicates comparable or lower flow completion times compared with DCTCP and NDP for most of the studied traffic scenarios. The simulation results imply that MDTCP could give better throughput for telco traffic and at the same time be as fair as MPTCP in datacenters.
下一代网络(5G)旨在支持低延迟、高吞吐量、高可用性等要求严格的业务。电信运营商纷纷采用NFV (Network Functions Virtualization)技术实现网络功能虚拟化,部署在分布式云数据中心。将虚拟网络功能(VNFs)部署在离最终用户较近的地方,可以减少Internet延迟。但是,电信云数据中心中的网络拥塞可能导致延迟增加、网络利用率降低和吞吐量下降。现有的协议不能利用数据中心拓扑提供的多路径,例如DCTCP;需要进行重大架构更改,并面临部署方面的挑战,例如NDP;或增加短流程(如MPTCP)的流程完成时间。为了解决这个问题,我们提出了一种用于电信云数据中心的多路径传输,称为耦合多路径数据中心TCP, MDTCP。MDTCP改进了MPTCP子流,在队列溢出之前使用ECN信号对拥塞做出反应,从而降低了延迟并提高了网络利用率。MDTCP与模拟流量的评估表明,在大多数研究的流量场景中,与DCTCP和NDP相比,MDTCP的流量完成时间相当或更低。仿真结果表明,MDTCP可以为电信业务提供更好的吞吐量,同时在数据中心中与MPTCP一样公平。
{"title":"MDTCP: Towards a Practical Multipath Transport Protocol for Telco Cloud Datacenters","authors":"Dejene Boru Oljira, Karl-Johan Grinnemo, A. Brunström, J. Taheri","doi":"10.1109/NOF.2018.8598129","DOIUrl":"https://doi.org/10.1109/NOF.2018.8598129","url":null,"abstract":"The next-generation networks (5G) aims to support services that demand strict requirements such as low-latency, high throughput, and high availability. Telecom operators have adopted Network Functions Virtualization (NFV) to virtualize the network functions and deploy at distributed cloud datacenters. Deploying virtual network functions (VNFs) close to the end-user can reduce Internet latency. However, network congestion in telco cloud datacenters can result in increased latency, low network utilization and a drop of throughput. The existing protocols are not capable of utilizing the multiple paths offered by datacenter topologies e.g., DCTCP; require a major architectural change and face deployment challenges e.g., NDP; or increase flow completion times of short flows e.g., MPTCP. To address this, we propose a multipath transport for telco cloud datacenters called coupled multipath datacenter TCP, MDTCP. MDTCP evolves MPTCP subflows to employ ECN signals to react to congestion before queue overflow, offering both reduced latency and higher network utilization. The evaluation of MDTCP with simulated traffic indicates comparable or lower flow completion times compared with DCTCP and NDP for most of the studied traffic scenarios. The simulation results imply that MDTCP could give better throughput for telco traffic and at the same time be as fair as MPTCP in datacenters.","PeriodicalId":319444,"journal":{"name":"2018 9th International Conference on the Network of the Future (NOF)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116113033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Business models of network slicing 网络切片的商业模式
Pub Date : 2018-11-01 DOI: 10.1109/NOF.2018.8597858
S. Kukliński, Lechosław Tomaszewski, Krzysztof Kozlowski, Slawomir Pietrzyk
Network slicing is a technology that will soon influence the way in which new networking solutions will be designed and operated. The approach impacts the telco business ecosystem significantly. In this paper, we discuss two business models that are enabled by network slicing. One of them is applicable to a single infrastructure domain, whereas another concerns the involvement of multiple infrastructure and slice providers through the use of the brokering mechanism. We have also discussed the implementation of the business models. In that context, we have shown the shortcomings of the ETSI NFV MANO architecture in a multi-provider environment and proposed its modifications.
网络切片是一项技术,它将很快影响新的网络解决方案的设计和操作方式。这种方法对电信业务生态系统产生了重大影响。在本文中,我们讨论了通过网络切片实现的两种业务模型。其中一个适用于单个基础设施领域,而另一个则通过使用代理机制涉及多个基础设施和切片提供者。我们还讨论了业务模型的实现。在此背景下,我们展示了ETSI NFV MANO架构在多提供商环境中的缺点,并提出了对其进行修改的建议。
{"title":"Business models of network slicing","authors":"S. Kukliński, Lechosław Tomaszewski, Krzysztof Kozlowski, Slawomir Pietrzyk","doi":"10.1109/NOF.2018.8597858","DOIUrl":"https://doi.org/10.1109/NOF.2018.8597858","url":null,"abstract":"Network slicing is a technology that will soon influence the way in which new networking solutions will be designed and operated. The approach impacts the telco business ecosystem significantly. In this paper, we discuss two business models that are enabled by network slicing. One of them is applicable to a single infrastructure domain, whereas another concerns the involvement of multiple infrastructure and slice providers through the use of the brokering mechanism. We have also discussed the implementation of the business models. In that context, we have shown the shortcomings of the ETSI NFV MANO architecture in a multi-provider environment and proposed its modifications.","PeriodicalId":319444,"journal":{"name":"2018 9th International Conference on the Network of the Future (NOF)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133885322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
ACLFLOW: An NFV/SDN Security Framework for Provisioning and Managing Access Control Lists ACLFLOW:用于配置和管理访问控制列表的NFV/SDN安全框架
Pub Date : 2018-11-01 DOI: 10.1109/NOF.2018.8598136
L. Mauricio, M. Rubinstein, O. Duarte
Router Access Control Lists (ACLs) are a traditional way to filter traffic on cloud computing selectively. However, a large number of rules may be required, whereas the storage capacity of router Ternary Content Addressable Memories (TCAMs) is scarce and expensive. This paper proposes a Network Functions Virtualization (NFV)/Software-Defined Networking (SDN) security framework, named ACLFLOW. ACLFLOW (i) translates regular ACLs (source/destination IP, source/destination port, and protocol) into OpenFlow filtering rules; (ii) creates and manages large OpenFlow ACLs on distributed software switches, which act as security virtual network functions (named OpenFlow VNF-ACLs), to address the TCAM storage capacity problem; (iii) implements a proposed algorithm to dynamically prioritize the most popular rule to accelerate switching operations; and (iv) orchestrates and accelerates the deployment of NFV/SDN environments into production clouds. We have implemented a framework prototype into the Open Platform for NFV (OPNFV) and evaluated its performance using different tools and scenarios. Results show that OpenFlow VNF-ACL improves maximum throughput by up to 90%, its HTTP request rates are up to 50% better, and it reduces Round Trip Time (RTT) by 70% when its performance is compared with a stateless Iptables running in virtual machines. Moreover, the proposed algorithm dynamically improves HTTP request rate of flows with the highest traffic volume by 15% and reduces RTT by 25% when compared with ACLFLOW without prioritization.
路由器访问控制列表(acl)是一种传统的有选择地过滤云计算流量的方法。然而,由于路由器三元内容可寻址存储器(TCAMs)的存储容量有限且价格昂贵,因此可能需要大量的规则。本文提出了一种网络功能虚拟化(NFV)/软件定义网络(SDN)安全框架ACLFLOW。ACLFLOW (i)将常规acl(源/目的IP、源/目的端口、协议)转换为OpenFlow过滤规则;(ii)在分布式软件交换机上创建和管理大型OpenFlow acl,作为安全虚拟网络功能(命名为OpenFlow vnf - acl),以解决TCAM存储容量问题;(iii)实现了一种算法,以动态优先化最流行的规则,以加速切换操作;(iv)协调和加速NFV/SDN环境在生产云中的部署。我们已经在NFV开放平台(OPNFV)中实现了一个框架原型,并使用不同的工具和场景评估了它的性能。结果表明,与运行在虚拟机中的无状态Iptables相比,OpenFlow VNF-ACL的最大吞吐量提高了90%,HTTP请求速率提高了50%,往返时间(RTT)减少了70%。此外,与无优先级的ACLFLOW相比,该算法动态地将流量最大的流的HTTP请求率提高了15%,RTT降低了25%。
{"title":"ACLFLOW: An NFV/SDN Security Framework for Provisioning and Managing Access Control Lists","authors":"L. Mauricio, M. Rubinstein, O. Duarte","doi":"10.1109/NOF.2018.8598136","DOIUrl":"https://doi.org/10.1109/NOF.2018.8598136","url":null,"abstract":"Router Access Control Lists (ACLs) are a traditional way to filter traffic on cloud computing selectively. However, a large number of rules may be required, whereas the storage capacity of router Ternary Content Addressable Memories (TCAMs) is scarce and expensive. This paper proposes a Network Functions Virtualization (NFV)/Software-Defined Networking (SDN) security framework, named ACLFLOW. ACLFLOW (i) translates regular ACLs (source/destination IP, source/destination port, and protocol) into OpenFlow filtering rules; (ii) creates and manages large OpenFlow ACLs on distributed software switches, which act as security virtual network functions (named OpenFlow VNF-ACLs), to address the TCAM storage capacity problem; (iii) implements a proposed algorithm to dynamically prioritize the most popular rule to accelerate switching operations; and (iv) orchestrates and accelerates the deployment of NFV/SDN environments into production clouds. We have implemented a framework prototype into the Open Platform for NFV (OPNFV) and evaluated its performance using different tools and scenarios. Results show that OpenFlow VNF-ACL improves maximum throughput by up to 90%, its HTTP request rates are up to 50% better, and it reduces Round Trip Time (RTT) by 70% when its performance is compared with a stateless Iptables running in virtual machines. Moreover, the proposed algorithm dynamically improves HTTP request rate of flows with the highest traffic volume by 15% and reduces RTT by 25% when compared with ACLFLOW without prioritization.","PeriodicalId":319444,"journal":{"name":"2018 9th International Conference on the Network of the Future (NOF)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134480232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Demonstration of NB-IoT for Maritime Use Cases NB-IoT海事用例演示
Pub Date : 2018-11-01 DOI: 10.1109/NOF.2018.8598067
Krzysztof Mateusz Malarski, Alexander Victor Tietgen Bardram, Mikkel Delbo Larsen, Jakob Thrane, M.N. Petersen, L. Moeller, S. Ruepp
In this work we investigate signal strength and quality of Narrowband Internet of Things (NB-IoT) in a marine environment. In particular, we demonstrate the suitability of the NB-IoT technology as signal carrier for maritime applications, where water and boat masts can potentially affect the transmission.
在这项工作中,我们研究了窄带物联网(NB-IoT)在海洋环境中的信号强度和质量。特别是,我们展示了NB-IoT技术作为海事应用信号载体的适用性,其中水和船桅杆可能会影响传输。
{"title":"Demonstration of NB-IoT for Maritime Use Cases","authors":"Krzysztof Mateusz Malarski, Alexander Victor Tietgen Bardram, Mikkel Delbo Larsen, Jakob Thrane, M.N. Petersen, L. Moeller, S. Ruepp","doi":"10.1109/NOF.2018.8598067","DOIUrl":"https://doi.org/10.1109/NOF.2018.8598067","url":null,"abstract":"In this work we investigate signal strength and quality of Narrowband Internet of Things (NB-IoT) in a marine environment. In particular, we demonstrate the suitability of the NB-IoT technology as signal carrier for maritime applications, where water and boat masts can potentially affect the transmission.","PeriodicalId":319444,"journal":{"name":"2018 9th International Conference on the Network of the Future (NOF)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121788982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Combining IoT Deployment and Data Visualization: experiences within campus maintenance use-case 结合物联网部署和数据可视化:校园维护用例中的经验
Pub Date : 2018-11-01 DOI: 10.1109/NOF.2018.8598127
Rumana Yasmin, Miikka Salminen, Ekaterina Gilman, J. Petäjäjärvi, Konstantin Mikhaylov, Minna Pakanen, A. Niemelä, J. Riekki, S. Pirttikangas, A. Pouttu
The internet of things (IoT) application domain is evolving continuously and is expected to bring digitalization making everything smart. This paper presents reference architecture for IoT system. Moreover, full implementation of such architecture is demonstrated with the IoT testbed deployed at the University of Oulu. Leveraging MQTT protocol, LoRaWAN is utilized as an IoT enabler technology for our platform, comprising a cloud server as well. In addition, a hybrid server is added to the platform to enable enhanced performance and functionality. To showcase the potential impacts of augmented reality (AR) based applications in an IoT infrastructure, we implemented and tested the maintenance support application. The implemented application visualizes environmental conditions and the sensor node itself as an augmented object on a mobile phone. A user study is carried out to discuss and showcase the potential impacts of using such a visualization approach.
物联网(IoT)应用领域正在不断发展,并有望带来数字化,使一切变得智能。本文提出了物联网系统的参考架构。此外,在奥卢大学部署的物联网测试平台上展示了这种架构的全面实施。利用MQTT协议,LoRaWAN被用作我们平台的物联网使能技术,也包括云服务器。此外,平台中还添加了一个混合服务器,以增强性能和功能。为了展示基于增强现实(AR)的应用在物联网基础设施中的潜在影响,我们实施并测试了维护支持应用程序。所实现的应用程序将环境条件和传感器节点本身可视化为移动电话上的增强对象。进行用户研究,讨论和展示使用这种可视化方法的潜在影响。
{"title":"Combining IoT Deployment and Data Visualization: experiences within campus maintenance use-case","authors":"Rumana Yasmin, Miikka Salminen, Ekaterina Gilman, J. Petäjäjärvi, Konstantin Mikhaylov, Minna Pakanen, A. Niemelä, J. Riekki, S. Pirttikangas, A. Pouttu","doi":"10.1109/NOF.2018.8598127","DOIUrl":"https://doi.org/10.1109/NOF.2018.8598127","url":null,"abstract":"The internet of things (IoT) application domain is evolving continuously and is expected to bring digitalization making everything smart. This paper presents reference architecture for IoT system. Moreover, full implementation of such architecture is demonstrated with the IoT testbed deployed at the University of Oulu. Leveraging MQTT protocol, LoRaWAN is utilized as an IoT enabler technology for our platform, comprising a cloud server as well. In addition, a hybrid server is added to the platform to enable enhanced performance and functionality. To showcase the potential impacts of augmented reality (AR) based applications in an IoT infrastructure, we implemented and tested the maintenance support application. The implemented application visualizes environmental conditions and the sensor node itself as an augmented object on a mobile phone. A user study is carried out to discuss and showcase the potential impacts of using such a visualization approach.","PeriodicalId":319444,"journal":{"name":"2018 9th International Conference on the Network of the Future (NOF)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125142946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Transparent Reordering Robust TCP Proxy To Allow Per-Packet Load Balancing in Core Networks 一个透明的重排序健壮的TCP代理允许在核心网络的每包负载平衡
Pub Date : 2018-11-01 DOI: 10.1109/NOF.2018.8597862
T. Ayar, L. Budzisz, B. Rathke
The idea to use multiple paths to transport TCP traffic seems very attractive due to its potential benefits it may offer for both redundancy and better utilization of available resources by load balancing. Fixed and mobile network providers employ frequently load-balancers that use multiple paths on either per-flow or per-destination level, but very seldom on per-packet level. Despite of the benefits of packet-level load balancing mechanisms (e.g., low computational complexity and high bandwidth utilization) network providers can’t use them mainly because of TCP packet reorderings that harm TCP performance. Emerging network architectures also support multiple paths, but they face with the same obstacle in balancing their load to multiple paths. Indeed, packet level load balancing research is paralyzed by the reordering vulnerability of TCP.A couple of TCP variants exist that deal with TCP packet reordering problem, but due to lack of end-to-end transparency they were not widely deployed and adopted. In this paper, we revisit TCP’s packet reorderings problem and present a transparent and light-weight algorithm, Out-of-Order Robustness for TCP with Transparent Acknowledgment (ACK) Intervention (ORTA), to deal with out-of-order deliveries.ORTA works as a transparent thin layer below TCP and hides harmful side-effects of packet-level load balancing. ORTA monitors all TCP flow packets and uses ACK traffic shaping, without any modifications to either TCP sender or receiver sides. Since it is transparent to TCP end-points, it can be easily deployed on TCP sender end-hosts (EHs), gateway (GW) routers, or access points (APs). ORTA opens a door for network providers to use per-packet load balancing.The proposed ORTA algorithm is implemented and tested in NS-2. The results show that ORTA can prevent TCP performance decrease when per-packet load balancing is used.
使用多条路径传输TCP流量的想法似乎非常有吸引力,因为它可能提供冗余和通过负载平衡更好地利用可用资源的潜在好处。固定和移动网络提供商经常使用负载平衡器,这些负载平衡器在每个流或每个目的地级别上使用多条路径,但很少在每个数据包级别上使用。尽管包级负载平衡机制有好处(例如,低计算复杂度和高带宽利用率),但网络提供商不能使用它们,主要是因为TCP数据包重排序会损害TCP性能。新兴的网络体系结构也支持多路径,但它们在平衡多路径负载方面面临着同样的障碍。实际上,TCP的重排序漏洞使包级负载均衡研究陷入瘫痪。存在一些处理TCP数据包重排序问题的TCP变体,但由于缺乏端到端透明性,它们没有被广泛部署和采用。在本文中,我们回顾了TCP的数据包重排序问题,并提出了一个透明和轻量级的算法,即带有透明确认(ACK)干预(ORTA)的TCP乱序鲁棒性,以处理乱序交付。ORTA作为TCP下面的透明薄层,隐藏了包级负载均衡的有害副作用。ORTA监控所有TCP流报文,使用ACK流量整形,不需要对TCP发送端和接收端进行任何修改。由于它对TCP端点是透明的,因此可以很容易地部署在TCP发送端主机(EHs)、网关(GW)路由器或接入点(ap)上。ORTA为网络提供商使用逐包负载平衡打开了一扇门。提出的ORTA算法在NS-2中进行了实现和测试。结果表明,在采用逐包负载分担时,ORTA可以防止TCP性能下降。
{"title":"A Transparent Reordering Robust TCP Proxy To Allow Per-Packet Load Balancing in Core Networks","authors":"T. Ayar, L. Budzisz, B. Rathke","doi":"10.1109/NOF.2018.8597862","DOIUrl":"https://doi.org/10.1109/NOF.2018.8597862","url":null,"abstract":"The idea to use multiple paths to transport TCP traffic seems very attractive due to its potential benefits it may offer for both redundancy and better utilization of available resources by load balancing. Fixed and mobile network providers employ frequently load-balancers that use multiple paths on either per-flow or per-destination level, but very seldom on per-packet level. Despite of the benefits of packet-level load balancing mechanisms (e.g., low computational complexity and high bandwidth utilization) network providers can’t use them mainly because of TCP packet reorderings that harm TCP performance. Emerging network architectures also support multiple paths, but they face with the same obstacle in balancing their load to multiple paths. Indeed, packet level load balancing research is paralyzed by the reordering vulnerability of TCP.A couple of TCP variants exist that deal with TCP packet reordering problem, but due to lack of end-to-end transparency they were not widely deployed and adopted. In this paper, we revisit TCP’s packet reorderings problem and present a transparent and light-weight algorithm, Out-of-Order Robustness for TCP with Transparent Acknowledgment (ACK) Intervention (ORTA), to deal with out-of-order deliveries.ORTA works as a transparent thin layer below TCP and hides harmful side-effects of packet-level load balancing. ORTA monitors all TCP flow packets and uses ACK traffic shaping, without any modifications to either TCP sender or receiver sides. Since it is transparent to TCP end-points, it can be easily deployed on TCP sender end-hosts (EHs), gateway (GW) routers, or access points (APs). ORTA opens a door for network providers to use per-packet load balancing.The proposed ORTA algorithm is implemented and tested in NS-2. The results show that ORTA can prevent TCP performance decrease when per-packet load balancing is used.","PeriodicalId":319444,"journal":{"name":"2018 9th International Conference on the Network of the Future (NOF)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126594044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Open issues in network slicing 网络切片中的开放问题
Pub Date : 2018-11-01 DOI: 10.1109/NOF.2018.8598130
Krzysztof Kozlowski, S. Kukliński, Lechosław Tomaszewski
Network slicing is a technology that will change the way in which future networks and services will be designed and operated. The approach impacts telco operators from the technical and business point of view. The technology is a subject of intensive research and standardization. The on-going work on network slicing has shown that many issues still have to be solved before the solution can be used by telco operators. Currently, the technology does not fulfill telco functional and performance-related requirements. In this paper, we describe the present status of network slicing and list the network slicing-related issues that still have to be solved. The list includes issues related to the scalability of slice management and orchestration, end-to-end slice orchestration, data plane and RAN slicing problems as well as business-oriented and legal issues.
网络切片是一项将改变未来网络和服务的设计和运营方式的技术。该方法从技术和业务角度影响了电信运营商。该技术是一个深入研究和标准化的课题。正在进行的网络切片工作表明,在电信运营商使用该解决方案之前,仍有许多问题需要解决。目前,该技术还不能满足电信功能和性能相关的要求。在本文中,我们描述了网络切片的现状,并列出了网络切片需要解决的相关问题。该列表包括与切片管理和编排的可伸缩性、端到端切片编排、数据平面和RAN切片问题以及面向业务和法律问题相关的问题。
{"title":"Open issues in network slicing","authors":"Krzysztof Kozlowski, S. Kukliński, Lechosław Tomaszewski","doi":"10.1109/NOF.2018.8598130","DOIUrl":"https://doi.org/10.1109/NOF.2018.8598130","url":null,"abstract":"Network slicing is a technology that will change the way in which future networks and services will be designed and operated. The approach impacts telco operators from the technical and business point of view. The technology is a subject of intensive research and standardization. The on-going work on network slicing has shown that many issues still have to be solved before the solution can be used by telco operators. Currently, the technology does not fulfill telco functional and performance-related requirements. In this paper, we describe the present status of network slicing and list the network slicing-related issues that still have to be solved. The list includes issues related to the scalability of slice management and orchestration, end-to-end slice orchestration, data plane and RAN slicing problems as well as business-oriented and legal issues.","PeriodicalId":319444,"journal":{"name":"2018 9th International Conference on the Network of the Future (NOF)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123704361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
IoT-Botnet Detection and Isolation by Access Routers 接入路由器的物联网僵尸网络检测与隔离
Pub Date : 2018-11-01 DOI: 10.1109/NOF.2018.8598138
Christian Dietz, Raphael Labaca Castro, Jessica Steinberger, Cezary W. Wilczak, Marcel Antzek, A. Sperotto, A. Pras
In recent years, emerging technologies such as the Internet of Things gain increasing interest in various communities. However, the majority of IoT devices have little or no protection at software and infrastructure levels and thus are also opening up new vulnerabilities that might be misused by cybercriminals to perform large-scale cyber attacks by means of IoT botnets. These kind of attacks lead to infrastructure and service outages and cause enormous financial loss, image and reputation damage. One approach to proactively block the spreading of such IoT botnets is to automatically scan for vulnerable IoT devices and isolate them from the Internet before they are compromised and also become part of the IoT botnet. The goal of this paper is to present an IoT botnet detection and isolation approach at the level of access routers that makes IoT devices more attack resilient. We show that our IoT botnet detection and isolation approach helps to prevent the compromise of IoT devices without the need to have in-depth technical administration knowledge, and hence make it viable for customers and end users.
近年来,物联网等新兴技术越来越受到各个社区的关注。然而,大多数物联网设备在软件和基础设施层面几乎没有或根本没有保护,因此也开辟了新的漏洞,这些漏洞可能被网络犯罪分子滥用,通过物联网僵尸网络进行大规模网络攻击。这类攻击会导致基础设施和服务中断,并造成巨大的经济损失、形象和声誉受损。主动阻止此类物联网僵尸网络传播的一种方法是自动扫描易受攻击的物联网设备,并在它们受到损害并成为物联网僵尸网络的一部分之前将其与互联网隔离。本文的目标是在访问路由器级别提出一种物联网僵尸网络检测和隔离方法,使物联网设备更具攻击弹性。我们表明,我们的物联网僵尸网络检测和隔离方法有助于防止物联网设备的危害,而不需要深入的技术管理知识,因此使其对客户和最终用户可行。
{"title":"IoT-Botnet Detection and Isolation by Access Routers","authors":"Christian Dietz, Raphael Labaca Castro, Jessica Steinberger, Cezary W. Wilczak, Marcel Antzek, A. Sperotto, A. Pras","doi":"10.1109/NOF.2018.8598138","DOIUrl":"https://doi.org/10.1109/NOF.2018.8598138","url":null,"abstract":"In recent years, emerging technologies such as the Internet of Things gain increasing interest in various communities. However, the majority of IoT devices have little or no protection at software and infrastructure levels and thus are also opening up new vulnerabilities that might be misused by cybercriminals to perform large-scale cyber attacks by means of IoT botnets. These kind of attacks lead to infrastructure and service outages and cause enormous financial loss, image and reputation damage. One approach to proactively block the spreading of such IoT botnets is to automatically scan for vulnerable IoT devices and isolate them from the Internet before they are compromised and also become part of the IoT botnet. The goal of this paper is to present an IoT botnet detection and isolation approach at the level of access routers that makes IoT devices more attack resilient. We show that our IoT botnet detection and isolation approach helps to prevent the compromise of IoT devices without the need to have in-depth technical administration knowledge, and hence make it viable for customers and end users.","PeriodicalId":319444,"journal":{"name":"2018 9th International Conference on the Network of the Future (NOF)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122503901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
A Multi-level Internet Traffic Classifier Using Deep Learning 基于深度学习的多层次互联网流量分类器
Pub Date : 2018-11-01 DOI: 10.1109/NOF.2018.8598055
O. Salman, I. Elhajj, A. Chehab, A. Kayssi
In the network domain, there is a continuous ongoing evolution in the type of connected devices and the nature of developed applications. This presents the network with varying Quality of Service (QoS) and security requirements. Consequently, there is a need to classify Internet traffic to facilitate its management. Thus, a granular classification based on needs is required, one which relates better to the network requirements of the traffic. In this paper, we apply deep learning to classify traffic requiring different QoS and security policies. We propose a multi-level classification framework applying a new data representation method. A comparison between the proposed data representation method and a previous method is presented. The implementation results show that the proposed data representation model outperforms the previous one and promises to permit the classification of the traffic at different granularity. Recording up to 95% accuracy using only the size, interarrival time, direction, transport protocol of the first 16 packets of each flow, our method can be employed in an online classification platform.
在网络领域,连接设备的类型和已开发应用程序的性质都在不断发展。这给网络带来了不同的服务质量(QoS)和安全需求。因此,有必要对互联网流量进行分类,以方便其管理。因此,需要基于需求的细粒度分类,这种分类与流量的网络需求有更好的关系。在本文中,我们应用深度学习对需要不同QoS和安全策略的流量进行分类。我们提出了一个多层次的分类框架,应用一种新的数据表示方法。并将所提出的数据表示方法与已有的数据表示方法进行了比较。实现结果表明,所提出的数据表示模型优于之前的数据表示模型,并承诺允许对不同粒度的流量进行分类。仅使用每个流的前16个数据包的大小、间隔时间、方向和传输协议记录准确率高达95%,该方法可用于在线分类平台。
{"title":"A Multi-level Internet Traffic Classifier Using Deep Learning","authors":"O. Salman, I. Elhajj, A. Chehab, A. Kayssi","doi":"10.1109/NOF.2018.8598055","DOIUrl":"https://doi.org/10.1109/NOF.2018.8598055","url":null,"abstract":"In the network domain, there is a continuous ongoing evolution in the type of connected devices and the nature of developed applications. This presents the network with varying Quality of Service (QoS) and security requirements. Consequently, there is a need to classify Internet traffic to facilitate its management. Thus, a granular classification based on needs is required, one which relates better to the network requirements of the traffic. In this paper, we apply deep learning to classify traffic requiring different QoS and security policies. We propose a multi-level classification framework applying a new data representation method. A comparison between the proposed data representation method and a previous method is presented. The implementation results show that the proposed data representation model outperforms the previous one and promises to permit the classification of the traffic at different granularity. Recording up to 95% accuracy using only the size, interarrival time, direction, transport protocol of the first 16 packets of each flow, our method can be employed in an online classification platform.","PeriodicalId":319444,"journal":{"name":"2018 9th International Conference on the Network of the Future (NOF)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122836450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Multi-Period Mission Planning of UAVs for 5G Coverage in Rural Areas: a Heuristic Approach 农村5G覆盖无人机多周期任务规划:一种启发式方法
Pub Date : 2018-11-01 DOI: 10.1109/NOF.2018.8598123
J. Galán-Jiménez, L. Chiaraviglio, L. Amorosi, N. Blefari-Melazzi
Nowadays, at least two billion people are experiencing a complete lack of cellular coverage. Since the lack of cellular connectivity is mostly experienced in rural zones, it is of mandatory importance to design solutions to manage cellular architectures tailored to such zones. To this aim, we consider a new cellular 5G architecture, where the Base Stations (BSs) are carried by Unmanned Aerial Vehicles (UAVs). Specifically, we focus on the problem of planning the missions of the UAV-based BSs over the territory, with the goal of minimizing the energy consumed for moving the UAVs. After introducing the considered framework, which is based on a multi-period graph defined over a set of places and a set of Time Slots (TSs), we derive a simple algorithm, called GAUP, to solve the considered problem in a reasonable amount of time. Our results, obtained over a simple - yet representative - scenario, reveals that GAUP is able to efficiently manage the energy for moving the UAVs, while guaranteeing relatively low computation times.
如今,至少有20亿人完全没有手机覆盖。由于蜂窝连接的缺乏主要发生在农村地区,因此设计解决方案来管理适合这些地区的蜂窝架构是非常重要的。为此,我们考虑了一种新的蜂窝5G架构,其中基站(BSs)由无人机(uav)携带。具体来说,我们关注无人机导航系统在领土上的任务规划问题,目标是使无人机移动消耗的能量最小。在引入所考虑的框架之后,该框架基于在一组地点和一组时隙(ts)上定义的多周期图,我们推导了一个简单的算法,称为GAUP,以在合理的时间内解决所考虑的问题。我们在一个简单但具有代表性的场景中获得的结果表明,GAUP能够有效地管理移动无人机的能量,同时保证相对较低的计算时间。
{"title":"Multi-Period Mission Planning of UAVs for 5G Coverage in Rural Areas: a Heuristic Approach","authors":"J. Galán-Jiménez, L. Chiaraviglio, L. Amorosi, N. Blefari-Melazzi","doi":"10.1109/NOF.2018.8598123","DOIUrl":"https://doi.org/10.1109/NOF.2018.8598123","url":null,"abstract":"Nowadays, at least two billion people are experiencing a complete lack of cellular coverage. Since the lack of cellular connectivity is mostly experienced in rural zones, it is of mandatory importance to design solutions to manage cellular architectures tailored to such zones. To this aim, we consider a new cellular 5G architecture, where the Base Stations (BSs) are carried by Unmanned Aerial Vehicles (UAVs). Specifically, we focus on the problem of planning the missions of the UAV-based BSs over the territory, with the goal of minimizing the energy consumed for moving the UAVs. After introducing the considered framework, which is based on a multi-period graph defined over a set of places and a set of Time Slots (TSs), we derive a simple algorithm, called GAUP, to solve the considered problem in a reasonable amount of time. Our results, obtained over a simple - yet representative - scenario, reveals that GAUP is able to efficiently manage the energy for moving the UAVs, while guaranteeing relatively low computation times.","PeriodicalId":319444,"journal":{"name":"2018 9th International Conference on the Network of the Future (NOF)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128824295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2018 9th International Conference on the Network of the Future (NOF)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1